tag:blogger.com,1999:blog-106240312024-03-07T12:36:24.017+01:00per spectivewith Per Strömsjöstromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.comBlogger373125tag:blogger.com,1999:blog-10624031.post-12458400578882169302023-06-20T11:41:00.002+02:002023-06-20T11:50:25.284+02:00finding his voice<p><i>all he cannot say</i></p><p><i>to the very same woman</i></p><p><i>yet another song</i></p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-7894996569642707812023-06-19T11:39:00.001+02:002023-06-20T11:39:21.624+02:00talking risk<p>Being a habitual interviewer, I was a tad surprised recently to find myself at the other end of a microphone. Hosted by the <i>Djungelpodden</i> podcast we had a conversation (in Swedish) about risk in connection with information security. </p><p>What do we mean by risk in this context, why is risk becoming ever more relevant, who should be working with risk and can risk really be all that fun? </p><p><a href="https://open.spotify.com/episode/0F1ZkLzrEYzJT7S0W1Kzbd" target="_blank">Listen in</a> at your own risk.</p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-72160234173386079972022-05-17T22:45:00.000+02:002022-05-17T22:45:28.645+02:00words not spoken<p><i>each and every time</i></p><p><i>courage fails him miserably</i></p><p><i>so many chances</i></p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-83322693318269946622022-05-16T22:43:00.000+02:002022-05-17T22:43:49.086+02:00truth in permanence<p>Preserving an object (not necessarily physical) means upholding a state. This desirable state can be viewed as a form of <b>truth</b> to be given <b>permanence</b>.</p><p>In <i>InfoSec</i> the <b>integrity</b> of information is being maintained. In the world of art we know we're dealing with the right painting but also in its proper condition. There are other forms of truth in art as well, not to be mixed up. For instance, do we trust an artist who claims to be representing some aspect of reality?</p><p>This - in a nutshell - is my ongoing essay.</p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-66673086154982110032022-02-04T12:33:00.001+01:002022-02-04T12:35:53.199+01:00time and space<p><i>seeing what she sees</i></p><p><i>closeness in spite of distance</i></p><p><i>knowing that she knows</i></p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-55306155397765520912022-02-03T23:22:00.000+01:002022-02-04T12:25:56.420+01:00Digital take-aways<p>So, what were my take-aways from <i><a href="https://www.stromsjo.se/2021/10/art-in-digital-environments.html">Art in Digital Environments</a></i>?</p><p>Art as a <b>process</b>. Digital art often assumes participator involvement to an extent where the artwork can be viewed as a process, rather than an object.</p><p>Preservation through <b>crowdsourcing</b>. Jon Ippolito argues compellingly that public involvement is the most effective way to preserve digital artworks over time.</p><p>Art as <b>resistance</b>. Regarding surveillance, globalisation or capitalism - more often than not, digital art carries a critical discourse.</p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-13480451761435020792021-10-30T21:30:00.000+02:002021-10-30T21:30:23.620+02:00Art in Digital Environments<p><i>Art in Digital Environments</i> is a course on which I'm about to embark.</p><p>There is hardly any agreed <b>definition</b> of art. Leaving that aside, what about those digital <b>environments</b>? I can imagine different interpretations.</p><p></p><ul style="text-align: left;"><li>traditional analog art being documented and shared digitally</li><li>analog art being digitised for reasons of preservation</li><li>art which involves digital elements but also traditional techniques</li><li>human-created art for a digital medium</li><li>art created by an algorithm</li></ul><p></p><p>Now, this should keep us busy for a while.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivGNoiy06HPI0SZnp8Ma3I46lhRHYlF3cuq2aTp7ohKEDA5eccJbG8-HcdMo6Bd4xgaSDw7ptye8QeRqvNG1izLsgVoLONhfQuHVMmpCoblkzyvi-atHVdJ9cP1nWPms13YOyLHw/s1280/artificial-intelligence-3382507_1280.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="853" data-original-width="1280" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivGNoiy06HPI0SZnp8Ma3I46lhRHYlF3cuq2aTp7ohKEDA5eccJbG8-HcdMo6Bd4xgaSDw7ptye8QeRqvNG1izLsgVoLONhfQuHVMmpCoblkzyvi-atHVdJ9cP1nWPms13YOyLHw/s320/artificial-intelligence-3382507_1280.jpg" width="320" /></a></div><br /><p><br /></p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-64764238632560168542021-03-30T10:39:00.000+02:002021-03-30T10:39:06.896+02:00what is "good"?<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcBvnSHJdujn3JHPLSKtwkLjmuLpi55CMFLr9QihTWq0740uxP3MG7uyATteg8xZrj-Pc1MaQiKSdSDOk-HA-zvIcGv5fffuz_lQibsCCv3s65OPZJvn5KJ261NqXtDbYuTFliCQ/s1280/hand-556905_1280.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="1280" data-original-width="989" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcBvnSHJdujn3JHPLSKtwkLjmuLpi55CMFLr9QihTWq0740uxP3MG7uyATteg8xZrj-Pc1MaQiKSdSDOk-HA-zvIcGv5fffuz_lQibsCCv3s65OPZJvn5KJ261NqXtDbYuTFliCQ/s320/hand-556905_1280.jpg" /></a></div><p></p><p>What do we mean by <b>sustainability</b>?</p><p><br /></p><p>When something is sustainable, it becomes <b>enduring</b>, even persistent. Before there was much talk about sustainability, people would prefer any <b>"good"</b> condition to be enduring - be that individual affection, corporate profit, communal health or territorial peace.</p><p><br /></p><p>So, what defines a "good", preferably long-lasting, condition? That is a <b>value judgment</b>. The value you and I place on health, wealth and freedom will differ.</p><p><br /></p><p>To define sustainability, we need to agree on what is "good".</p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-87385168638745769142021-02-16T21:13:00.000+01:002021-02-16T21:13:11.971+01:00how decisions happen<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Vln-Th1pwfwlqhy-DKXONSwxlF5e5pUZvf41Xqgp29WZKbjK5E2IL1p3ua_2ActtZt2UFPbLHHGOzTLJBuxW0v685bRO6cAMx_uYwOHiezp6ExAyrO6fwQnP5__WzL9F5LdVVQ/s301/primer-on-decision-making.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: right;"><img border="0" data-original-height="301" data-original-width="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Vln-Th1pwfwlqhy-DKXONSwxlF5e5pUZvf41Xqgp29WZKbjK5E2IL1p3ua_2ActtZt2UFPbLHHGOzTLJBuxW0v685bRO6cAMx_uYwOHiezp6ExAyrO6fwQnP5__WzL9F5LdVVQ/s0/primer-on-decision-making.jpg" /></a></div><p>I've been reading about different perspectives on decision-making.</p><p><br /></p><p></p><ul style="text-align: left;"><li>I'm a rational individual, I know my preferences, analyse every consequence and choose the best alternative.</li><li>Well, I haven't got the information or the time to make a perfect decision. Rationality is bounded.</li><li>I'm implementing my identity by deciding according to (the right) rules, at the right time, in the right fashion.</li><li>As a decision-maker I'm rarely alone. What happens in a team with conflicting identities and values?</li></ul><p></p><p><br /></p><p>To be continued...</p><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-54189988767815119692020-06-19T11:04:00.003+02:002020-06-19T11:27:12.330+02:00inspiration and energy beyond Trondheim<div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrEs3r0Ik33aqEkKMVJ5e8tCmYp4xK4A9B0OQh20RcDQVYKd0yeTODSfUhYrCT1JeVPvprD3Yllk4z7JRTZe3VOIZ19GekL5cW-kPDnEOzcslrVOtHHWRyEj94683UL1iaFHY2Qg/s754/0617+COLLAGE.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="754" data-original-width="754" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrEs3r0Ik33aqEkKMVJ5e8tCmYp4xK4A9B0OQh20RcDQVYKd0yeTODSfUhYrCT1JeVPvprD3Yllk4z7JRTZe3VOIZ19GekL5cW-kPDnEOzcslrVOtHHWRyEj94683UL1iaFHY2Qg/w256-h256/0617+COLLAGE.jpg" width="256" /></a><div style="margin-left: 1em; margin-right: 1em; text-align: right;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2QjgwlH9PIP7ryHYgMEG8sbxd5PPxuK4vyas0j_wlah5XudwA1zooXiy26S_Z8C_uGvULpAr4XIdS-kBu0cmNY_KhFn5YAWTIKWX1f1fTS0vG9Vq80U4Cewdz0-5LP7iT_uXWpQ/s754/0618+COLLAGE.jpg" style="margin-left: 1em; margin-right: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2QjgwlH9PIP7ryHYgMEG8sbxd5PPxuK4vyas0j_wlah5XudwA1zooXiy26S_Z8C_uGvULpAr4XIdS-kBu0cmNY_KhFn5YAWTIKWX1f1fTS0vG9Vq80U4Cewdz0-5LP7iT_uXWpQ/s754/0618+COLLAGE.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="754" data-original-width="754" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2QjgwlH9PIP7ryHYgMEG8sbxd5PPxuK4vyas0j_wlah5XudwA1zooXiy26S_Z8C_uGvULpAr4XIdS-kBu0cmNY_KhFn5YAWTIKWX1f1fTS0vG9Vq80U4Cewdz0-5LP7iT_uXWpQ/w256-h256/0618+COLLAGE.jpg" width="256" /></a></div></div><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: left;">For pandemic reasons, the <a href="https://iticse.acm.org/" target="_blank">25th conference</a> on <i>Innovation and Technology in Computer Science Education</i> (<b>ITiCSE</b>) had to relocate from <i>Trondheim</i> to <i>Moodle</i> and <i>Zoom</i>.</div><div class="separator" style="clear: both; text-align: left;"><br /></div><div class="separator" style="clear: both; text-align: left;">This was my first ITiCSE. While attendees on other continents were struggling with time-zone differences, I enjoyed travel-less conferencing at my desk. The virtual format worked surprisingly well with a few tolerable glitches.</div><div class="separator" style="clear: both; text-align: left;"><br /></div><div class="separator" style="clear: both; text-align: left;">My main take-aways were <b>inspiration</b>, <b>energy</b> and pointers to new <b>resources</b> in the real world of non-security specialists.</div></div></div><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-2498740668951929222020-06-12T16:17:00.003+02:002020-06-12T16:37:45.590+02:00Zeke Wolf has an image problem<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4tPeER-FfWhBKi8BLHnv-OXACZ2O9Tpxz1UHZeXIlPtgzX7qMcp2vG0yRCSugP6kyIYV2JLwHqTq1-7KK0wmxuhXx5o98XGWAT1hyphenhyphenULkgh2ie-DWkIaHxrhyphenhyphenotFWx9DXazOa4gQ/s4032/IMG_1495.JPG" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1884" data-original-width="4032" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4tPeER-FfWhBKi8BLHnv-OXACZ2O9Tpxz1UHZeXIlPtgzX7qMcp2vG0yRCSugP6kyIYV2JLwHqTq1-7KK0wmxuhXx5o98XGWAT1hyphenhyphenULkgh2ie-DWkIaHxrhyphenhyphenotFWx9DXazOa4gQ/w640-h300/IMG_1495.JPG" title="From Joakim 8/1980" width="640" /></a></div><div style="text-align: center;"><i>From Joakim 8/1980</i></div><div style="text-align: center;"><br /></div><div>The <b>Big Bad Wolf</b> is a pathetic figure. He tries to be evil but his actions fail and turn out well. Others cheer him. The humiliation!</div><div><br /></div><div>So what? Yes, he's fiction. And yet we can learn something.</div><div><br /></div><div><a href="https://www.stromsjo.se/2011/05/meet-your-infosec-risk.html">In InfoSec</a>, we subdivide <b>Threat Sources</b> into the dichotomy <b>intentional/accidental</b>. Villainous Zeke is clearly intentional, he wants to Be Bad. But he always fails. How do we categorise such an actor? Let's think of Threat Sources in terms of their <b>effectiveness</b>. The <i>Three Little Pigs</i> have learned to do just that.</div><div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-66773364096838486312020-05-31T23:05:00.000+02:002020-05-31T23:09:32.215+02:00others on risk<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisvdFEDi0mf_HQwXA6KZk0AoO7xbClIc6lWxnPzZYQtwT1rb4zUI2OaApZWGxZtVZIO3cCfVEX1E0ExBtlFLQc2Ic2SktLQBMWuLEyhb6sKbR8hRMJ83rxGrHeld5GqpCpaYS6sg/s1600/blog-2355684_1280.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="853" data-original-width="1280" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisvdFEDi0mf_HQwXA6KZk0AoO7xbClIc6lWxnPzZYQtwT1rb4zUI2OaApZWGxZtVZIO3cCfVEX1E0ExBtlFLQc2Ic2SktLQBMWuLEyhb6sKbR8hRMJ83rxGrHeld5GqpCpaYS6sg/s400/blog-2355684_1280.jpg" width="400" /></a></div>
<b>Blogs</b> have their lifecycle.<br />
<br />
In fact, the <b>blog format</b> has passed its hype and entered what some would call a <i>plateau of productivity</i>.<br />
<br />
A <b>blog list</b> is a nice feature, with active feeds bubbling to the top. <i>RSS</i> feeds might seem out of fashion. Still, being able to subscribe to tailored channels is a powerful technique.<br />
<br />
Blogs appear, develop and fade. My blog list <b>others on risk</b> (see the sidebar) has been a tad neglected. Some members have been silent for years. Others have now taken their places. Enjoy!<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-57629409709197812172020-04-13T07:13:00.000+02:002020-05-31T12:39:01.148+02:00mind those misses<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEtKCJ6oMTcurJM9WVLZy3VrPwHHIT3qpOfHKq84EiX-n73pFocuzFZIXIKy_PxvwcymPBL6C5R0eCWSVf7kM1cVxA8fWIObY-h6J2Y4kzQfzghXP6gjWc4NzR1HhC8i7XadtXMA/s1600/sea-3594409_1280.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="853" data-original-width="1280" height="212" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEtKCJ6oMTcurJM9WVLZy3VrPwHHIT3qpOfHKq84EiX-n73pFocuzFZIXIKy_PxvwcymPBL6C5R0eCWSVf7kM1cVxA8fWIObY-h6J2Y4kzQfzghXP6gjWc4NzR1HhC8i7XadtXMA/s320/sea-3594409_1280.jpg" width="320" /></a></div>
An <a href="https://hbr.org/2011/04/how-to-avoid-catastrophe" target="_blank">article in HBR</a> suggests a way to avoid catastrophes by focusing on <b>near misses</b>, situations where luck saved the day.<br />
<br />
The authors describe how <b>latent errors</b> (such as gas leakage at an oil rig) combine with <b>enabling conditions</b> (a windless day or a welder working nearby) to cause failure (think of the BP Gulf disaster).<br />
<br />
Lessons for <i>InfoSec</i> are to leverage incident reporting to catch smaller mishaps and to explicitly manage <b>vulnerabilities</b> as a precursor to <a href="https://www.stromsjo.se/2011/05/meet-your-infosec-risk.html">risk identification</a> with <b>threat sources</b>.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-72884319279280851272020-02-23T17:54:00.000+01:002020-05-31T12:31:14.243+02:00an educator thinking aloud<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVr1LuUHk_vPbp-p2P7tD7Dfbztu7I18e1hDMbY0g1hJK666pNRTLH-K2zvzcRMYiQdEau6hljZv-xemfU0PPhk0KLiybaS4rDl77NybTa5dEcHxtTl5Ko1vndOe8329ewmGL1yg/s1600/technology-1095751_1280.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="357" data-original-width="1280" height="177" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVr1LuUHk_vPbp-p2P7tD7Dfbztu7I18e1hDMbY0g1hJK666pNRTLH-K2zvzcRMYiQdEau6hljZv-xemfU0PPhk0KLiybaS4rDl77NybTa5dEcHxtTl5Ko1vndOe8329ewmGL1yg/s640/technology-1095751_1280.jpg" width="640" /></a></div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
I've been tweeting and blogging about my educator role, sharing ideas and occasional glimpses of content from seminars and courses. The goal is to "think aloud" when developing new material, while being more transparent about my narrative.<br />
<br />
At first, I tried collecting these in <b>Twitter Moments</b>. That format has turned out to be unstable, even unworkable, so I'm pinning my hopes now on <b>Twitter's Collections</b> feature.<br />
<br />
Please find the "Teaching" Collection under a tab of its own at the top of the page.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-10160550477901246392019-11-29T22:12:00.000+01:002020-03-29T22:15:38.889+02:00Kilomba on IgnoranceArtist <b>Grada Kilomba's</b> captivating <a href="http://www.bildmuseet.umu.se/en/exhibition/grada-kilomba/35304" target="_blank">film trilogy Illusions</a> addresses human rights in our time using well-known fables such as <i>Narcissus and Echo</i>.<br />
<br />
She challenges our perception of <b>ignorance</b> as merely a reflection of legitimate lack of access rights. What if, asks Kilomba, ignorance itself is a reflection of privilege?<br />
<br />
<i><span style="font-size: large;">one does not know,</span></i><br />
<i><span style="font-size: large;">one does not have to know,</span></i><br />
<i><span style="font-size: large;">and one should not know.</span></i><br />
<br />
Such a <b>multiple layer of ignorances</b> could offer a comfortable distance to wrongs and thereby stifle accountability.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-18593649513259690872019-08-07T11:40:00.000+02:002019-08-07T11:40:09.983+02:00carved in stone<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi6RPi6FFUEdt8O5V8csp7Do3gexLUqmEeJJUVQgR7yzMuyrXKwupF-1en-7cfoxHd5215Oxn8Aemc_WGJuvYCnz6Z06MlTzbN6QSXRq1x9kxwbElHCzoURGBccfHxDeDRxKDquw/s1600/IMG_9262-COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1600" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi6RPi6FFUEdt8O5V8csp7Do3gexLUqmEeJJUVQgR7yzMuyrXKwupF-1en-7cfoxHd5215Oxn8Aemc_WGJuvYCnz6Z06MlTzbN6QSXRq1x9kxwbElHCzoURGBccfHxDeDRxKDquw/s640/IMG_9262-COLLAGE.jpg" width="640" /></a></div>
I guess time has caught up with Swedish expressionist artist and sculptor <b>Siri Derkert</b>.<br />
<br />
In my youth I used to think of her <a href="https://sv.wikipedia.org/wiki/Ristningar_i_betong#/media/Fil:Derkert_%C3%96stermalms_tunnelbanestation.jpg" target="_blank">blasted</a> concrete subway artworks as dull and self-important. (Then again, I couldn't be bothered to care about any contemporary art.)<br />
<br />
Now, what I see is instead grace and materiality and Siri's timeless thoughts of peace and women are gaining a renewed sense of urgency in this day and age.<br />
<br />
Here is Derkert's <b>Study for Female Pillar</b>, part of the collection at <i>Moderna museet</i>.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-1515425169665765012019-07-31T20:23:00.002+02:002019-07-31T20:23:46.201+02:00sampling Trockel<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqBcxjmejPOAN75xdHKJb6xKEXkKLLQ73_ENEDehaZDTFbj911YuOtUqDaYrGL4gpBlclUWf8VUrCjCRQBb1yjdznvaeokYrStxcWM8FsD8r3W06dvgsSYPpuci_xJPwdfqsbeCw/s1600/IMG_9200-COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1600" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqBcxjmejPOAN75xdHKJb6xKEXkKLLQ73_ENEDehaZDTFbj911YuOtUqDaYrGL4gpBlclUWf8VUrCjCRQBb1yjdznvaeokYrStxcWM8FsD8r3W06dvgsSYPpuci_xJPwdfqsbeCw/s640/IMG_9200-COLLAGE.jpg" width="640" /></a></div>
<br />
I spend lots of time in art exhibitions these days. My favourite is <a href="https://www.modernamuseet.se/stockholm/en/" target="_blank">Moderna museet</a> which has become sort of second home when I've got time on my hands.<br />
<br />
Taking photos of pictures might sound pointless but I like experimenting with "sampling" artworks into bits and pieces and then having these rearranged into a photo collage.<br />
<br />
Rosemarie Trockel has knitted a monochrome <a href="http://sis.modernamuseet.se/en/view/objects/asitem/artist$00408838/5/primaryMaker-asc?t:state:flow=dc45caf2-191f-4ab3-a505-6fb36e848e25" target="_blank">After The Hunt</a>. With wool yarn and wood she challenges how pictures are supposed to be made. And here is my attempt at sampling Trockel.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-87054817890658994032019-07-27T15:39:00.000+02:002019-07-27T15:39:29.308+02:00a student, a volunteer and a consultant<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoF5oCrhJp26L6IIfVL98bxrEDu05DZ4Q7QvdxRPB3Fg8YeSjwnVh0FrUaOh4IiZ3hfpmXLkHS4-NrFQpqaS-JspRdfaScmESjJgh6cjqPNCWV-77Zy6q4jiDz4nZ_UtK7t_xi7A/s1600/DSC_0338.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="436" data-original-width="693" height="401" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoF5oCrhJp26L6IIfVL98bxrEDu05DZ4Q7QvdxRPB3Fg8YeSjwnVh0FrUaOh4IiZ3hfpmXLkHS4-NrFQpqaS-JspRdfaScmESjJgh6cjqPNCWV-77Zy6q4jiDz4nZ_UtK7t_xi7A/s640/DSC_0338.jpg" width="640" /></a></div>
<br />
After five years as an employed consultant, I will continue under my own flag. In recent years I've been privileged to teach Information Security which is superb training from a generalist perspective, but now I will refocus on Information Risk in three different ways. First, I will return to the <b>university</b> to dig deeper in the theory realm of risk. Second, I might do a bit of <b>volunteering</b> in a "security advisor" capacity. Last but not least, there should be room for some <b>consulting</b> as an educator.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-34881475432364325542019-04-23T15:55:00.000+02:002019-04-23T15:55:44.549+02:00on maturity and abstraction<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiy2DuUs_jWJS8qbtLKjaofuagD7EXjOIdUZAYeRrOsSo99EO3JhxLaPu5S_J9aqStC0fsY67-JFQ6V43ozKvw-KAR17L-8jYIHeVHVDmM8ttwQZZUoR1vsYOErTNiQtBTxJmH3g/s1600/operativ+1904+COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1600" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiy2DuUs_jWJS8qbtLKjaofuagD7EXjOIdUZAYeRrOsSo99EO3JhxLaPu5S_J9aqStC0fsY67-JFQ6V43ozKvw-KAR17L-8jYIHeVHVDmM8ttwQZZUoR1vsYOErTNiQtBTxJmH3g/s640/operativ+1904+COLLAGE.jpg" width="640" /></a></div>
<br />
What is <i>Security Architecture</i> and what does it take for an organisation to master this domain?<br />
<br />
<b><a href="https://www.dfkompetens.se/utbildning/operativ-informationssakerhet" target="_blank">Operativ informationssäkerhet</a></b> in April welcomed six guest lecturers.<br />
<br />
<b>Sebastian Åkerman</b> offered a maturity perspective on architecture and helped us navigate between properties, controls, mechanisms and components.<br />
<br />
Other guest sessions covered <i>Safe UX</i>, <i>Crisis Management</i>, agile ideology, <i>Business Continuity</i> and <i>Secure Development</i>.<br />
<br />
Two group exercises and an individual assignment took us from theory to practice.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-61784695519753383962019-03-09T20:51:00.001+01:002019-04-23T15:56:40.782+02:00Know Thy Assets<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc-PBx9ahvE959BjfyWAzELSbC65jBbpE4fGUYgjjextUkVLYCTJkPS31M2eGoTudrvfiCtLD-cMtAvNENE9lNFvEJwLqtER5gHi6wXygutfXM0G8cQr_q59Kyu9EMU3Q-yOFdKw/s1600/strategisk+1903+COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1600" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc-PBx9ahvE959BjfyWAzELSbC65jBbpE4fGUYgjjextUkVLYCTJkPS31M2eGoTudrvfiCtLD-cMtAvNENE9lNFvEJwLqtER5gHi6wXygutfXM0G8cQr_q59Kyu9EMU3Q-yOFdKw/s640/strategisk+1903+COLLAGE.jpg" width="640" /></a></div>
<br />
<br />
How can organisations get a better grip on their information assets, and what aspects are there to master?<br />
<br />
In the March edition of <b><a href="https://www.dfkompetens.se/utbildning/strategisk-informationssakerhet" target="_blank">Strategisk Informationssäkerhet</a></b> with five guest lecturers, Information Architect <b>Tina Lindevall</b> of Huddinge kommun made the case for <i>Information Cognizance</i> (Informationskännedom).<br />
<br />
Other guest sessions covered <i>Security Law</i>, <i>Policy</i> and <i>Classification</i>, educating co-workers and <i>Security Strategies</i>.<br />
<br />
An individual assignment as well as two group exercises provided a bit of practice.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-50679149944740477152019-01-05T21:51:00.003+01:002019-01-05T21:51:59.425+01:00my year in art (2): Walk The Line<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDjHwgbYOJRityNRW4l0GersKJz5s3nB3hoY7biwtJUynW-vSJ1A0i8EZVYSdwQI_tWGL_EkrCmgNe8YNY62cmmqs-PxY7CMf6i8TvNHqXy2SG9XczcnzvOq9RosXobSUo24enig/s1600/IMG_4862-COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1600" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDjHwgbYOJRityNRW4l0GersKJz5s3nB3hoY7biwtJUynW-vSJ1A0i8EZVYSdwQI_tWGL_EkrCmgNe8YNY62cmmqs-PxY7CMf6i8TvNHqXy2SG9XczcnzvOq9RosXobSUo24enig/s640/IMG_4862-COLLAGE.jpg" width="640" /></a></div>
Glass art - basically pretty and harmless? Hardly. One 2018 highlight was the Dunkers group show <a href="https://dunkerskulturhus.se/utstallningar/arkiv/walk-the-line/" target="_blank">Walk The Line</a> showcasing nine different artistries having glass as a common denominator. <br />
<br />
Terese William Waenerlund, Åsa Ljungnelius, Birgitta Ahlin, Sirkka Lehtonen, Nina Westman, Ditte Johansson, Ingalena Klenell and Fredrik Nielsen made it clear that Swedish glass manufacturing is alive and kicking.<br />
<br />
At least one coat got too close for comfort during the exhibition weeks. Hardly harmless material!<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-68076829597876102702018-12-08T18:45:00.000+01:002018-12-08T18:45:19.844+01:00rules of engagement<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwtEFlIynCMmtfC589bTHZiCy4Nd75vWa6hcb3LZzDzugMyFEXQxrfGL1GwnbV3RCe0xVPNdmy1CZnfDEfNnvqgxYegh_SetEucHDeI7PdV_Gr1kuof19kgI1C7JP1rQjLdaKhzg/s1600/teknisk+1812-COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1600" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwtEFlIynCMmtfC589bTHZiCy4Nd75vWa6hcb3LZzDzugMyFEXQxrfGL1GwnbV3RCe0xVPNdmy1CZnfDEfNnvqgxYegh_SetEucHDeI7PdV_Gr1kuof19kgI1C7JP1rQjLdaKhzg/s640/teknisk+1812-COLLAGE.jpg" width="640" /></a></div>
<br class="Apple-interchange-newline" />A fully booked recent edition of <a href="https://www.dfkompetens.se/utbildning/teknisk-informationssakerhet" target="_blank">Teknisk informationssäkerhet</a> at <i>DF Kompetens</i> offered group exercises about availability, Threat Analysis and PKI/IAM.<br />
<br />
What does a security officer need to know about ordering a <b>Penetration Test</b>? From scoping and 'rules of engagement' to report and confidentiality, <i>Joel Harsten</i> took us on a guided tour.<br />
<br />
Our guest lecturers also covered Digital Self Defence, cryptography and data recovery.<br />
<br />
An individual assignment on security measures for travellers preceded the course.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-63396975563558294472018-11-22T14:47:00.000+01:002018-11-22T14:47:32.143+01:00bridging the gap<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3IsRa3WpFPcd82_Iy1szNR1zTnKqq5gEzJwaCABfYm2z0f4hcHeREBVJQ6D5gG015lfbZ1hvC19NPa0shy5GU3IdV6gDbUpd8DIV6vzBQvcJV8vDfrdsvD8R7VRd-ZZ7UtnkRiw/s1600/strategisk+1811-COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1197" data-original-width="1197" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3IsRa3WpFPcd82_Iy1szNR1zTnKqq5gEzJwaCABfYm2z0f4hcHeREBVJQ6D5gG015lfbZ1hvC19NPa0shy5GU3IdV6gDbUpd8DIV6vzBQvcJV8vDfrdsvD8R7VRd-ZZ7UtnkRiw/s640/strategisk+1811-COLLAGE.jpg" width="640" /></a></div>
Infosec pros must find ways to bridge the knowledge gap at home. In the November edition of <b>Strategisk informationssäkerhet</b>, <b>Hanna Lagerquist</b> stressed the importance of motivating co-workers through effective, targeted training.<br />
<br />
Our four guest lecturers also covered Security Law, Security Strategies and Security Processes as well as Information Operations.<br />
<br />
Participants did an assignment on analysing organisational context plus team exercises on Data Protection, Information Classification and Risk Analysis.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-83892921399795787242018-10-27T11:53:00.001+02:002018-10-27T11:57:27.199+02:00my year in art (1): Perpetual Uncertainty<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZnS_li1FWELz6RFKO-77KqzzRZ77RSQ93bwd6Qa9nkCyjV3TyXt4xtk8tWlgPEv5ioSsRCILe_GCg10eEoKVRIVLssuXGJOnkPUD2cnxDWWskjPdfBCdDQcGuZ9jsXLyOsFwd6Q/s1600/IMG_5815-COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1600" data-original-width="1600" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZnS_li1FWELz6RFKO-77KqzzRZ77RSQ93bwd6Qa9nkCyjV3TyXt4xtk8tWlgPEv5ioSsRCILe_GCg10eEoKVRIVLssuXGJOnkPUD2cnxDWWskjPdfBCdDQcGuZ9jsXLyOsFwd6Q/s640/IMG_5815-COLLAGE.jpg" width="640" /></a></div>
<br />
Produced by <i>Bildmuseet</i> and showcased in Malmö, the exhibition <a href="http://www.bildmuseet.umu.se/en/exhibition/perpetual-uncertainty/22269" target="_blank">Perpetual Uncertainty</a> was one of my artsy highlights of the year. The name refers to long-lived effects of nuclear technology.<br />
<br />
The exhibition mixed peaceful nuclear power with military applications, which is something I find counter-productive.<br />
<br />
How can we communicate danger (think waste disposal site) <a href="http://inheritance-project.net/index.php/page-2/" target="_blank">to our descendants</a> when our civilisation is long gone? This relates to my teaching on how we can archive <b>data</b> but not <b>information</b>.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0tag:blogger.com,1999:blog-10624031.post-15753590191562094362018-10-13T19:23:00.000+02:002018-10-13T19:23:16.304+02:00make it fun!<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifbBu_FH7zVhktseOlKOAF8Z8HomAISU0JWJ2epXaKKyetpGLmyN-aHivl7Q7OppyvV6RW8c_JGKybb2St5gdEQJbPmpD3zIINmcwOgUZ1PXGN8AaoGcxGiRW3GbS-wrAYMh_gMQ/s1600/operativ+1810-COLLAGE.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="1053" data-original-width="1053" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifbBu_FH7zVhktseOlKOAF8Z8HomAISU0JWJ2epXaKKyetpGLmyN-aHivl7Q7OppyvV6RW8c_JGKybb2St5gdEQJbPmpD3zIINmcwOgUZ1PXGN8AaoGcxGiRW3GbS-wrAYMh_gMQ/s640/operativ+1810-COLLAGE.jpg" width="640" /></a></div>
Involve users and build motivation rather than relying on paragraphs. Create simple plans. Try to frame quality as fun. In the October edition of <b>Operativ informationssäkerhet</b>, <b>Andreas Sjödin</b> made the case for driving sustainable change in <i>Business Continuity</i>.<br />
<br />
Our sextet of guest lecturers also covered <i>Safe UX</i>, practical <i>Crisis Management</i>, <i>Security Architecture</i>, <i>Agility & Security</i> and <i>Secure Development</i>.<br />
<br />
Participants did an assignment on <i>Privacy by Design</i> plus team exercises on <i>OWASP Top 10</i> and <i>ISO 27002</i>.<div class="blogger-post-footer">/per</div>stromsjohttp://www.blogger.com/profile/05524397187094481360noreply@blogger.com0